December 2024
Title
SSA-876787 V1.2 (Last Update: 2024-12-10): Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs
Published
Dec. 10, 2024, 1 a.m.
Summary
Several SIMATIC S7-1500 and S7-1200 CPU versions are affected by an open redirect vulnerability that could allow an attacker to make the web server of affected devices redirect a legitimate user to an attacker-chosen URL. For a successful attack, the legitimate user must actively click on an attacker-crafted link. Siemens ...
Title
SSA-981975 V1.4 (Last Update: 2024-12-10): Information Disclosure Vulnerability in Intel-CPUs (CVE-2022-40982) Impacting SIMATIC IPCs
Published
Dec. 10, 2024, 1 a.m.
Summary
Several Intel-CPU based SIMATIC IPCs are affected by an information exposure vulnerability (CVE-2022-40982) in the CPU that could allow an authenticated local user to potentially read other users’ data [1]. The issue is also known as “Gather Data Sampling” (GDS) or Downfall Attacks. For details refer to the chapter “Additional ...
Title
SSA-097435 V1.6 (Last Update: 2024-12-10): Usernames Disclosure Vulnerability in Mendix Runtime
Published
Dec. 10, 2024, 1 a.m.
Summary
Mendix Runtime contains an observable response discrepancy vulnerability when validating usernames during authentication. This could allow unauthenticated remote attackers to distinguish between valid and invalid usernames. Siemens has released new versions for the affected products and recommends to update to the latest versions. Note that some, Mendix Runtime version lines ...
Title
SSA-042050 V1.2 (Last Update: 2024-12-10): Know-How Protection Mechanism Failure in TIA Portal
Published
Dec. 10, 2024, 1 a.m.
Summary
The know-how protection feature in Totally Integrated Automation Portal (TIA Portal) does not properly update the encryption of existing program blocks when a project file is updated. This could allow attackers with access to the project file to recover previous - yet unprotected - versions of the project without the ...
Title
SSA-128393 V1.0: Firmware Decryption Vulnerability in SICAM A8000 CP-8031 and CP-8050
Published
Dec. 10, 2024, 1 a.m.
Summary
The SICAM A8000 CP-8031 and CP-8050 devices are affected by a vulnerability that could allow an attacker with physical access to the device to decrypt the firmware. Siemens has released new firmware and hardware versions for the affected products and recommends to update to the latest versions. Both the firmware ...
Title
SSA-723487 V1.3 (Last Update: 2024-12-10): RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products
Published
Dec. 10, 2024, 1 a.m.
Summary
This advisory documents the impact of CVE-2024-3596 (also dubbed “Blastradius”), a vulnerability in the RADIUS protocol, to SCALANCE, RUGGEDCOM and related products. The vulnerability could allow on-path attackers, located between a Network Access Server (the RADIUS client, e.g., SCALANCE or RUGGEDCOM devices) and a RADIUS server (e.g., SINEC INS), to ...
Title
SSA-711309 V2.2 (Last Update: 2024-12-10): Denial of Service Vulnerability in the OPC UA Implementations of SIMATIC Products
Published
Dec. 10, 2024, 1 a.m.
Summary
The OPC UA implementations (ANSI C and C++) as used in several SIMATIC products contain a denial of service vulnerability that could allow an unauthenticated remote attacker to create a denial of service condition by sending a specially crafted certificate. Siemens has released new versions for several affected products and ...
November 2024
Title
SSA-097435 V1.5 (Last Update: 2024-11-26): Usernames Disclosure Vulnerability in Mendix Runtime
Published
Nov. 26, 2024, 1 a.m.
Summary
Mendix Runtime contains an observable response discrepancy vulnerability when validating usernames during authentication. This could allow unauthenticated remote attackers to distinguish between valid and invalid usernames. Siemens has released new versions for the affected products and recommends to update to the latest versions.
Title
SSA-354569 V1.0: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices
Published
Nov. 22, 2024, 1 a.m.
Summary
Palo Alto Networks has published [1] information on vulnerabilities in PAN-OS. This advisory lists the related Siemens Industrial products affected by these vulnerabilities. Siemens is preparing fix versions and recommends countermeasures for products where fixes are not, or not yet available. [1] https://security.paloaltonetworks.com/
Title
SSA-824503 V1.0: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation Before V2302.0018 and V2404.0007
Published
Nov. 18, 2024, 1 a.m.
Summary
Siemens Tecnomatix Plant Simulation contains multiple file parsing vulnerabilities that could be triggered when the application reads files in WRL format. If a user is tricked to open a malicious file with any of the affected products, this could lead the application to crash or potentially lead to arbitrary code ...
Title
SSA-472448 V1.0: Security Bypass Vulnerability in the SQL Client-Server Communication in Siveillance Video
Published
Nov. 13, 2024, 1 a.m.
Summary
Siveillance Video is affected by a security bypass vulnerability in the Microsoft .NET implementation of SQL Client as described in CVE-2024-0056. Siemens has released new versions for the affected products and recommends to update to the latest versions.
Title
SSA-773256 V1.1 (Last Update: 2024-11-12): Impact of Socket.IO CVE-2024-38355 on Siemens Industrial Products
Published
Nov. 12, 2024, 1 a.m.
Summary
A Socket.IO vulnerability affects multiple Siemens industrial products. This vulnerability consists of a specially crafted Socket.IO packet that triggers an uncaught exception on the Socket.IO server killing the Node.js process allowing a remote attacker to cause Denial-of-Service condition in the affected products. Siemens has released new versions for several affected ...
Title
SSA-915275 V1.0: Multiple Vulnerabilities in SINEC INS Before V1.0 SP2 Update 3
Published
Nov. 12, 2024, 1 a.m.
Summary
SINEC INS before V1.0 SP2 Update 3 is affected by multiple vulnerabilities. Siemens has released a new version for SINEC INS and recommends to update to the latest version.
Title
SSA-962515 V1.4 (Last Update: 2024-11-12): Out of Bounds Read Vulnerability in Industrial Products
Published
Nov. 12, 2024, 1 a.m.
Summary
Several industrial products contain an out of bounds read vulnerability that could allow an attacker to cause a Blue Screen of Death (BSOD) crash of the underlying Windows kernel, leading to denial of service condition. Siemens has released new versions for several affected products and recommends to update to the ...
Title
SSA-914892 V1.0: Race Condition Vulnerability in Basic Authentication Implementation of Mendix Runtime
Published
Nov. 12, 2024, 1 a.m.
Summary
The basic authentication mechanism of Mendix Runtime contains a race condition vulnerability which could allow unauthenticated remote attackers to circumvent default account lockout measures. Siemens has released new versions for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where fixes are ...
Title
SSA-883918 V1.2 (Last Update: 2024-11-12): Information Disclosure Vulnerability in SIMATIC WinCC
Published
Nov. 12, 2024, 1 a.m.
Summary
Multiple versions of SIMATIC WinCC and SIMATIC PCS 7 do not properly handle certain requests to their web application (WinCC WebNavigator, PCS 7 Web Server, and PCS 7 Web Diagnostics Server), which may lead to the leak of privileged information. This could allow an unauthenticated remote attacker to retrieve information ...
Title
SSA-723487 V1.2 (Last Update: 2024-11-12): RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products
Published
Nov. 12, 2024, 1 a.m.
Summary
This advisory documents the impact of CVE-2024-3596 (also dubbed “Blastradius”), a vulnerability in the RADIUS protocol, to SCALANCE, RUGGEDCOM and related products. The vulnerability could allow on-path attackers, located between a Network Access Server (the RADIUS client, e.g., SCALANCE or RUGGEDCOM devices) and a RADIUS server (e.g., SINEC INS), to ...
Title
SSA-876787 V1.1 (Last Update: 2024-11-12): Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs
Published
Nov. 12, 2024, 1 a.m.
Summary
Several SIMATIC S7-1500 and S7-1200 CPU versions are affected by an open redirect vulnerability that could allow an attacker to make the web server of affected devices redirect a legitimate user to an attacker-chosen URL. For a successful attack, the legitimate user must actively click on an attacker-crafted link. Siemens ...
Title
SSA-871035 V1.0: Session-Memory Deserialization Vulnerability in Siemens Engineering Platforms Before V19
Published
Nov. 12, 2024, 1 a.m.
Summary
Affected products do not properly sanitize user-controllable input when parsing files. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application. Siemens has released new versions for several affected products and recommends to update to the latest versions. Siemens is preparing further ...
Title
SSA-454789 V1.0: Deserialization Vulnerability in TeleControl Server Basic V3.1
Published
Nov. 12, 2024, 1 a.m.
Summary
TeleControl Server Basic V3.1 contains a deserialization vulnerability that could allow an unauthenticated attacker to execute arbitrary code on the device. Siemens has released new versions for the affected products and recommends to update to the latest versions.
Title
SSA-654798 V1.0: Incorrect Authorization Vulnerability in SIMATIC CP 1543-1 Devices
Published
Nov. 12, 2024, 1 a.m.
Summary
SIMATIC CP 1543-1 devices contain an Incorrect Authorization vulnerability that could allow an unauthenticated attacker to gain access to the filesystem. Siemens has released a new version for SIMATIC CP 1543-1 V4.0 and recommends to update to the latest version.
Title
SSA-039007 V1.2 (Last Update: 2024-11-12): Heap-based Buffer Overflow Vulnerability in User Management Component (UMC)
Published
Nov. 12, 2024, 1 a.m.
Summary
Siemens User Management Component (UMC) is affected by a heap-based buffer overflow vulnerability which could allow an unauthenticated remote attacker arbitrary code execution. Siemens has released new versions for several affected products and recommends to update to the latest versions. Siemens is preparing further fix versions and recommends countermeasures for ...
Title
SSA-000297 V1.0: Multiple SQLite Vulnerabilities in RUGGEDCOM CROSSBOW Station Access Controller Before V5.6
Published
Nov. 12, 2024, 1 a.m.
Summary
RUGGEDCOM CROSSBOW Station Access Controller (SAC) contains multiple vulnerabilities in the integrated SQLite component that could allow an attacker to execute arbitrary code or to create a denial of service condition. Siemens has released a new version for RUGGEDCOM CROSSBOW Station Access Controller (SAC) and recommends to update to the ...
Title
SSA-064257 V1.0: Privilege Escalation Vulnerability in SIPORT Before V3.4.0
Published
Nov. 12, 2024, 1 a.m.
Summary
SIPORT before V3.4.0 contains a privilege escalation vulnerability which could allow a local attacker with an unprivileged account to override or modify the service executable and subsequently gain elevated privileges. Siemens has released a new version for SIPORT and recommends to update to the latest version.
Title
SSA-054046 V1.1 (Last Update: 2024-11-12): Unauthenticated Information Disclosure in Web Server of SIMATIC S7-1500 CPUs
Published
Nov. 12, 2024, 1 a.m.
Summary
Several SIMATIC S7-1500 CPU versions are affected by an authentication bypass vulnerability that could allow an unauthenticated remote attacker to gain knowledge about actual and configured maximum cycle times and communication load of the CPU. Siemens has released new versions for several affected products and recommends to update to the ...

Last Updates

BOSCH PSIRT
14.08.2025
SIEMENS CERT
09.09.2025
US CERT
25.08.2025
US CERT (ICS)
09.09.2025

By Source

Archive

2025
2024
2023
2022
2021
2020
2019
2018
2017

Feeds